Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following viruses infects multiple targets?

A.

Macro virus

B.

Multipartite virus

C.

Polymorphic virus

D.

Stealth virus

A Security administrator wants to configure policies that dictate what types of network traffic are allowed in the network. Which types of signature should he use to configure such type of policies?

A.

DoS signatures

B.

Connection signatures

C.

Exploit signatures

D.

String signatures

Jacob is worried about sniffing attacks and wants to protect his SMTP transmissions from this attack. What can he do to accomplish this?

A.

Use an SSL certificate.

B.

Use EFS.

C.

Use a proxy server.

D.

Use a firewall.

Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?

A.

Electronic Communications Privacy Act of 1986

B.

Wiretap Act

C.

Computer Fraud and Abuse Act

D.

Economic Espionage Act of 1996

You are the Network Administrator for a company that frequently exchanges confidential emails without outside parties (clients, vendors, etc.). You want those emails to be encrypted; however, you want the least difficulty in the encryption process. Which of the following should you choose?

A.

DES

B.

MD5

C.

Asymmetric Encryption

D.

Symmetric Encryption

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. The network contains a Windows Server 2008 Core computer named SERVER1 with NTFS file system. SERVER1 has a 802.11 wireless LAN adapter. The Wireless LAN Service is installed on SERVER1. You want to know about the 802.11 wireless LAN interface information, network information, and wireless settings on the system on SERVER1.

Which of the following commands will you use to accomplish the task?

A.

netsh wlan show interfaces

B.

netsh wlan show all

C.

netsh wlan show settings

D.

netsh wlan show drivers

Which of the following tools is used to hide secret data in text files and is based on the concept that spaces and tabs are generally not visible in text viewers and therefore a message can be effectively hidden without affecting the text's visual representation for the casual observer?

A.

SARA

B.

Snow.exe

C.

Fpipe

D.

Image hide

Adam works as a Professional Penetration Tester for Umbrella Inc. A project has been assigned to him to carry out a Black Box penetration testing as a regular evaluation of the system security and integrity of the company's network. Which of the following statements are true about the Black Box penetration testing?

Each correct answer represents a complete solution. Choose all that apply.

A.

Black box testing provides the testers with complete knowledge of the infrastructure to be tested.

B.

Black box testing simulates an attack from someone who is familiar with the system.

C.

Black box testing simulates an attack from someone who is unfamiliar with the system.

D.

Black box testing assumes no prior knowledge of the infrastructure to be tested.

You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement?

Each correct answer represents a complete solution. Choose two.

A.

Using WPA encryption

B.

MAC filtering the router

C.

Using WEP encryption

D.

Not broadcasting SSID

John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1.

Original cookie values:

ItemID1=2

ItemPrice1=900

ItemID2=1

ItemPrice2=200

Modified cookie values:

ItemID1=2

ItemPrice1=1

ItemID2=1

ItemPrice2=1

Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price.

Which of the following hacking techniques is John performing?

A.

Cookie poisoning

B.

Cross site scripting

C.

Man-in-the-middle attack

D.

Computer-based social engineering

Eric is the project manager of the NQQ Project and has hired the ZAS Corporation to complete part of the project work for Eric's organization. Due to a change request the ZAS Corporation is no longer needed on the project even though they have completed nearly all of the project work. Is Eric's organization liable to pay the ZAS Corporation for the work they have completed so far on the project?

A.

Yes, the ZAS Corporation did not choose to terminate the contract work.

B.

It depends on what the termination clause of the contract stipulates.

C.

It depends on what the outcome of a lawsuit will determine.

D.

No, the ZAS Corporation did not complete all of the work.

Which of the following security policies will you implement to keep safe your data when you connect your Laptop to the office network over IEEE 802.11 WLANs?

Each correct answer represents a complete solution. Choose two.

A.

Using personal firewall software on your Laptop.

B.

Using an IPSec enabled VPN for remote connectivity.

C.

Using portscanner like nmap in your network.

D.

Using a protocol analyzer on your Laptop to monitor for risks.

The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable attachment even in Microsoft Outlook's preview pane. The Klez worm gathers email addresses from the entries of the default Windows Address Book (WAB). Which of the following registry values can be used to identify this worm?

A.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

B.

HKEY_CURRENT_USER\Software\Microsoft\WAB\WAB4\Wab File Name = "file and pathname of the WAB file"

C.

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

D.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices

Which of the following blocks unwanted advertisements and small windows that pop up suddenly in IE, without user's initiation?

A.

Phishing filter

B.

Pop-up blocker

C.

Content Advisor

D.

Cookies

Which of the following is a process of monitoring data packets that travel across a network?

A.

ICMP

B.

SCP protocol

C.

Rootkit

D.

Packet sniffing